General

  • Target

    baaaf62661f4c7df3d7e466f357433da0723efa9d63ec06a5fe7df2d8920f62e

  • Size

    3.1MB

  • Sample

    241031-j7n95swlek

  • MD5

    e0c4c0ca9ed3874398f2122f3fb4e925

  • SHA1

    554521815630c05950ac0ff3908d0cfa1c6e62f9

  • SHA256

    baaaf62661f4c7df3d7e466f357433da0723efa9d63ec06a5fe7df2d8920f62e

  • SHA512

    3aa0b41b06fe114182b75dcc8cd6d1ab75a42fd258b3acf99850c0dd574b83c9662b357331a9d6c575a4177c6d9487d53a9e9ed7926d223fde3650ba6e97c439

  • SSDEEP

    98304:5AyXe7ykegiTNpjQpSI14jSKQoDXAy0YbJ31nu2Cmh:vXe7tiTHjY4jS1sXA/mJ5u2nh

Malware Config

Targets

    • Target

      baaaf62661f4c7df3d7e466f357433da0723efa9d63ec06a5fe7df2d8920f62e

    • Size

      3.1MB

    • MD5

      e0c4c0ca9ed3874398f2122f3fb4e925

    • SHA1

      554521815630c05950ac0ff3908d0cfa1c6e62f9

    • SHA256

      baaaf62661f4c7df3d7e466f357433da0723efa9d63ec06a5fe7df2d8920f62e

    • SHA512

      3aa0b41b06fe114182b75dcc8cd6d1ab75a42fd258b3acf99850c0dd574b83c9662b357331a9d6c575a4177c6d9487d53a9e9ed7926d223fde3650ba6e97c439

    • SSDEEP

      98304:5AyXe7ykegiTNpjQpSI14jSKQoDXAy0YbJ31nu2Cmh:vXe7tiTHjY4jS1sXA/mJ5u2nh

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks